Automated Malware Analysis

Slides:



Advertisements
Similar presentations
Malware Dynamic Analysis Part 5 Veronica Kovah vkovah.ost at gmail See notes for citation1
Advertisements

Merovingio: mislead the malware Juan Carlos Montes – INTECO-CERT.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Operating System Security : David Phillips A Study of Windows Rootkits.
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
1 Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code (DOME) Subha Ramanathan & Arun Krishnamurthy Nov 15, 2005.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Maintaining and Updating Windows Server 2008
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
MSF Testing Introduction Functional Testing Performance Testing.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Portal and AQAS-Philadelphia University 21-22/6/2011 AVCI Platform in PU Dr. Abdel-Rahman Al-Qawasmi Philadelphia University Director of Computer Center.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Introduction to HP LoadRunner Getting Familiar with LoadRunner >>>>>>>>>>>>>>>>>>>>>>
Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions.
TESTING STRATEGY Requires a focus because there are many possible test areas and different types of testing available for each one of those areas. Because.
A Hybrid Framework to Analyze Web and OS Malware Vitor M. Afonso, Dario S. Fernandes Filho, André R. A. Grégio1, PauloL.de Geus, Mario Jino.
Futurestate IT Confidential APPLICATION COMPATIBILITY AND CURRENCY MANAGEMENT™ John Doe Partner Company.
Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions.
Presented by: Kushal Mehta University of Central Florida Michael Spreitzenbarth, Felix Freiling Friedrich-Alexander- University Erlangen, Germany michael.spreitzenbart,
Screen Snapshot Service Kurt Biery SiTracker Monitoring Meeting, 23-Jan-2007.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
Behavior-based Spyware Detection By Engin Kirda and Christopher Kruegel Secure Systems Lab Technical University Vienna Greg Banks, Giovanni Vigna, and.
Implementation - Deployment Methods of deployment –User PC –Network shared (workstation install) –Terminal server –Web Deployment (ActiveX) (Note: this.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
Click to edit Master title style Click to edit Master text styles Second level Third level Fourth level Fifth level June 10 th, 2009Event details (title,
Module 14: Configuring Server Security Compliance
Microsoft Application Virtualization 5.0: Introduction Mohnish Chaturvedi & Ian Bartlett Premier Field Engineer WCL312.
Cosc 4010 Sandboxing. Last lecture Last time, we covered chroot, which is a method to "sandbox" a problem. –Not full proof by any means. Many simple mistakes.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
INTRODUCTION TO VIRTUALIZATION KRISTEN WILLIAMS MOSES IKE.
Contents 1.Introduction, architecture 2.Live demonstration 3.Extensibility.
AccessMiner Using System- Centric Models for Malware Protection Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu and Engin Kirda.
Module 5: Configuring Internet Explorer and Supporting Applications.
Christopher Kruegel University of California Engin Kirda Institute Eurecom Clemens Kolbitsch Thorsten Holz Secure Systems Lab Vienna University of Technology.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Microsoft Management Seminar Series SMS 2003 Change Management.
November 19, 2008 CSC 682 Use of Virtualization to Thwart Malware Written by: Ryan Lehan Presented by: Ryan Lehan Directed By: Ryan Lehan Produced By:
Homework tar file Download your course tarball from web page – Named using your PSU ID – Chapter labeled for each binary.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
CCNA1 v3 Module 1 v3 CCNA 1 Module 1 JEOPARDY K. Martin.
Microsoft ® Official Course Module 6 Managing Software Distribution and Deployment by Using Packages and Programs.
2: Operating Systems Networking for Home & Small Business.
Plug-In Architecture Pattern. Problem The functionality of a system needs to be extended after the software is shipped The set of possible post-shipment.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Maintaining and Updating Windows Server 2008 Lesson 8.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
MCSA Windows Server 2012 Pass Upgrading Your Skills to MCSA Windows Server 2012 Exam By The Help Of Exams4Sure Get Complete File From
Chapter 2 Operating Systems
Platform as a Service (PaaS)
Chapter 6: Securing the Cloud
Fundamentals Sunny Sharma Microsoft
Platform as a Service (PaaS)
Malware Reverse Engineering Process
Malware Reverse Engineering Process
Part 1: Basic Analysis Chapter 1: Basic Static Techniques
Chapter 2. Malware Analysis in VMs
Chapter 3. Basic Dynamic Analysis
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Basic Dynamic Analysis VMs and Sandboxes
Presentation transcript:

Automated Malware Analysis A Look at Cuckoo Sandbox

Introduction What is Malware? (mãl'wâr') - Malicious computer software that interferes with normal computer functions What is Automated Malware Analysis? Taking what has been done by highly skilled professionals in extremely time consuming tasks and making it, quick, easy and repeatable. Automated Malware Analysis is being touted as the “Next Generation Anti-Virus” solution. Why automate malware analysis? To free up the time from those highly skilled professionals to focus on other things.

Difficulties to Overcome Malware can be generic or targeted, adding that it can be polymorphic, packed or self modifying code, the number of possibilities are infinite Manual malware analysis is time consuming Traditional static analysis takes a very strong and specific set of skills Manually performing dynamic analysis is tedious at best

Sandboxing Protected runtime environment Containment Monitoring Automation Complete command execution Ease of Use

Predicaments of Sandboxing Commercial solutions are not always cost effective (FireEye, Dambala) No guarantee the malware will work the same as in the real world Sandbox can be detected Results can be confusing or overwhelming Automation of exploit analysis is not trivial

Sandboxing Questions Why are you doing this? What do you expect to achieve? What information is most relevant to me or to my organization? Who is the intended audience for the results to be presented to? What kind of malware do you want to analyze (Adobe, Office, browser, etc…)? Where are the malware samples coming from?

Cuckoo Sandbox Open source automated malware analysis system Uses virtualization (VirtualBox, KVM, VMWare) Python based, easy to customize Multiple report types (JSON, HTML, MAEC) NOT a drop in replacement for commercial solutions at this point. No automated malware identification or loading.

Cuckoo Sandbox Data Captured Native functions and Windows API calls traces Copies of files created and deleted from the filesystem Dump of the memory of the selected process Screenshots of the desktop during the execution of the malware analysis Network dump generated by the machine used for the analysis

Cuckoo Components Scheduler Analyzer Cmonitor Chook Virtual Machine

Scheduler Main component 100% Python, easily customizable Dispatches the pending tasks to the pool of virtual machines available Runs all the modules

Analyzer Executes the malware Chosen depending on the platform of the selected machine (Windows only at this time) 100% Python Monitors and records systems calls Meat of the analysis

Cmonitor DLL using chook to install hooks on predefined win32 functions inside process memory Gets injected into the target process (QueueUserAPC or CreateRemoteThread) Logs the functions calls to files

Chook Custom inline hooking library Allows definition of custom hook trampolines Replaced Microsoft Detours

Virtual Machine Usage Any VM product can be used Works with Windows as the client (though 7 and 2008 server are still buggy) Snapshots are used and returned to snapshot state when completed (no infected machine left after analysis) Client VM can have any configuration or applications installed to test

Execution flow Fetch a task Prepare the analysis Launch analyzer in virtual machine Execute an analysis package Complete the analysis Store the results Process and create reports

Submitting New Tasks Web Interface Command Line Options: VM to use Platform (windows only as of v.4) Timeout Package Priority Malware to be Analyzed

Modules and Customization Analysis Packages Machine Managers Processing Reporting Signatures

Analysis Again 100% Python Defines how the analyzer should start and interact with the malware Specified at submission or selected upon file type Can be written to perform any tasks deemed necessary

Packages EXE Default – Windows executables DLL You can specify a function to use otherwise DllMain PDF Launches Acrobat Reader DOC or XLS Office, Need to verify path in package is the same as host OS IE HTML/JS Browser testing BIN Shell code or other generic binary data

Machine Managers Processing Used to manage the Virtual Machines being used Processing Modules used to generate a container of normalized information on the analysis that report generation will use

Reporting Use the normalized results and do something with them Can use MongoDB for customized reporting and tracking Built in report types that include all relevant data Can pull in data from VirusTotal based on MD5

Signatures Look for patterns or specific events Assign them a description and severity level Give context to the reports Help non-malware experts understand

DEMO

References Cuckoo Sandbox is a malware analysis system. http://cuckoosandbox.org/ Malwr.com is a free malware analysis service based on Cuckoo Sandbox http://www.malwr.com/ VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware. https://www.virustotal.com/ Honeynet Project is a leading international 501c3 non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools to improve Internet security http://www.honeynet.org/ The Pros and Cons of Dynamic Malware Dissection https://www.damballa.com/downloads/r_pubs/WP_Next_Generation_Anti-Virus.pdf